Click here to close now.




















Welcome!

Microservices Expo Authors: Liz McMillan, Pat Romanski, Elizabeth White, Lori MacVittie, Ian Khan

Related Topics: Microservices Expo, Java IoT, Industrial IoT

Microservices Expo: Article

Business Design for the Service-Oriented Enterprise

Design patterns for the smart, continuously evolving, virtual enterprise.

The way we design business is undergoing profound transformation. For the past 100 years business design has been directly influenced by Frederick Taylor, focused on how we do work and how we can make it more efficient. The LEAN and Six Sigma movements are the visible manifestation of that thinking. Together with BPM they have focused on incremental improvements of primarily internal processes and tasks encoded in process orchestration and workflows that control how the enterprise works.

But this is equivalent to looking in the rear view mirror to design tomorrows business. In this article we will look at three major trends that are going to break this conventional model.

  • Smart behaviors enabling cross ecosystem processes
  • Capability services (independent business components) enabling continuously evolving business models
  • The convergence of consumer and business IT enabling the real end user

Along the way we identify and list a number of primary patterns that describe this new world. Most of which by the way, are not new.

The original SOA vision of the enterprise as a network of services is now attainable by many enterprises. But the route to the Service Oriented Enterprise is not so direct; it must evolve and integrate with an ecosystem of services that reflects business reality.

Smart Behavior in the Ecosystem
Just over ten years ago when you walked into an airport you would stand in line for an agent and collect your boarding pass. When you wanted to purchase a book you visited a bookshop. In each of these use cases we transacted with human beings.

Today, in each of these use cases, we interact instead with an automated interface that actually does more than the human interface. In the case of Amazon of course they have moved far beyond the scope of a book shop, the interface is considerably improved because Amazon provides extensive customer reviews and a virtual market in which we can interact with vast numbers of specialist providers to acquire niche or second hand products. In the case of the boarding pass collection, not only has the airport check-in process been replaced with self-service, the physical pass itself is eliminated and we can have an image of the boarding pass sent to our smart phone which is scanned at the security checkpoint. At the same time the boarding pass frequently contains personalized advertising and vouchers for airport shops and behind the scenes the airline system may be checking with security agencies as well as perhaps establishing lounge access and in some territories checking with immigration and passport control as well.

What.s happening in these examples is that we have moved beyond automation of the basic process and integrated services from an ecosystem of providers that span numerous enterprises, to deliver an enhanced and more efficient service to the consumer, and in the process, eliminated unnecessary human intervention.

These examples have some very important lessons for us all. First, enterprise architecture must increasingly be scoped around an ecosystem that encompasses traditional and new participants in the process. Second intervention in the business process should be eliminated except where it is an intrinsic step in the process for a human or some form of node or agent to play a part. The real end user places an order. A toll barrier detects and reports a vehicle. A scanner detects and reports a piece of luggage has been received at an airport terminal. But be careful, because apart from customers and physical actions, most "human" interventions can and should be substituted by rules, and alerts used to bring humans into play only on an exceptional basis.

In recent years there has been a focus on autonomic or smart systems and there has been much attention on fully automating certain processes in verticals such as energy, climate change, transportation and healthcare. These processes are rather obvious candidates for rules based mediation and intervention, often using sensors to drive rules based processes, but we should look beyond this relatively narrow definition of smart systems and apply the same thinking across the entire enterprise architecture and business process design.

Continuously Evolving Business
As the enterprise becomes increasingly part of one or more ecosystems, (yes each enterprise will almost certainly be involved in more than one) there are further predictable changes to the business design. First, the enterprise inevitably becomes more focused on its core business because participation of partners naturally creates networks of specialists. Consider what is Amazon.s core business? They may have started out as a book seller in 1994, but today the core business today is clearly the platform, including all layers of the stack spanning Cloud technology to commercial storefront and business intelligence.

Second, the enterprise must become much more adaptive. Because the ecosystem is comprised of numerous specialist partners, each participant will be driving an independent business strategy that naturally serves their own objectives and goals. So each participant will need to be prepared to both lead and respond in equal measure, and this applies equally to a platform provider as an ecosystem participant.

In consequence each enterprise needs to manage its business as a set of highly independent capability services that can be upgraded, switched on and off with minimal impact on the rest of the ecosystem with upgrade lead times measured in weeks, not months and years.

Third, successful specialized capabilities may well exhibit exponential growth as the enterprise is so much more tightly focused.

Over the past decade the idea of business change has become almost a cliche. The business services and software marketing industries have pulled the change rabbit out of the proverbial hat so many times that we are all quite inured to the message. However the above discourse is quite serious, insofar as the supply and demand signals for change are clearly set to become even more acute. And the required response time will be similarly challenging.

The way to respond to this challenge is to reduce dependencies, to forge independent units of capability that offer software services that automate the interfaces with capability consumers and that are designed to be rapidly evolved without major impact on the consumers.

In the early stages of SOA, we and many other analysts articulated a clear vision for SOA . a network of standardized services that provided a stable and enduring set of interfaces for consumers to easily integrate core capability services into customized solutions, supported by highly independent implementation components with no implementation level dependencies. In other words architecture designed to support continuous evolution.

Since then a few organizations have achieved that vision, but it must be said, it is a minority of enterprises. We anticipate that given the radical transformation in prospect, most enterprises will redouble their efforts to reboot their SOA, to achieve the service architecture vision which is going to be a critical success factor for most enterprises.

Convergence of Consumer and Business IT
People are demanding to use their own gadgets and devices for business use. Attempting to prevent this is very short sighted.

Since its inception in the 80s the PC has dominated business computing. Over the past decade the rise of consumer technology has been spectacular but largely separate from enterprise computing. IT departments have frequently laid down rules for use of consumer technologies, in many cases using security as a primary reason why personal devices of all types should not be used in the business network. Of course Web services protocols have shown that message based security is perfectly adequate, and in many situations provides stronger risk prevention than transport based security.

CIOs that try to limit consumer technology run the risk of creating a grey zone, where employees bring their own technology to work in defiance of IT policy. This is not a new problem as it happened in the 80s when computer enthusiasts brought their PCs into the office to use VisiCalc, Excel and Word. But this time around it.s not only enthusiasts, it.s pretty much everyone!

While PCs are not going to disappear any time soon, it.s clear that there is a huge groundswell of demand for people to use their own devices in business, or at least to be provided with consumer grade technology. And this demand isn.t restricted to college graduates - the use of smartphones and tablets is now ubiquitous across society. So the challenge for IT departments is for consumer technologies to be integrated into the business process both internal to the enterprise and with external end users.

Consequently we are already seeing the reversal of the normal pattern where business leads technology adoption; today consumer technology, smart phones and tablets, are being brought into the enterprise computing network. At this juncture therefore, the term "consumer" technology is becoming redundant and might be superseded by "personal". And it really is personal - the reason people want to use their own device is because of the amazingly high ease of use in a single, integrated device that spans all requirements.

Yesterday's IT business was also all about the User Interface (UI). The UI was the way the business visualized and articulated its requirements, and was the foundation stone of countless methodologies and the basis for Agile methods and prototyping. For the past few years the emphasis has been on multi-channel UI, supporting conventional client/server, browsers, kiosks and devices. But this is all going to change.

WILLEM EELMAN, the chief information officer (CIO) of Unilever, an Anglo-Dutch consumer-goods giant, recounts the reaction of young employees when they first come across the complicated and often confusing ways in which many big corporate IT systems still present information to staff. ¡°They take a look at a business-application screen and they scream in horror,¡± he says. The youngsters are even more horrified when presented with tomes of instructions through which they must plough before getting down to work. Economist October 8th 2011

As discussed above, in tomorrow.s business our objective is to eliminate all unnecessary user interfaces in a business process. The UIs that remain should be genuine user interfaces that are connected to the genuine end user . not an internal proxy. This is illustrated by the Horse.s Mouth pattern. And the use of personal technology allows us to communicate effectively with the actual end user in real or near real time, with a user interface that is appropriate for the relationship between provider and consumer.

One of the most interesting developments in the consumer technology space has been the emergence of the "App" and App Store. This allows a customized interface with an appropriate amount of local processing, and customization. Enterprises are clearly using Apps today for consumer purposes and we should expect that enterprises will extend this model for business process integration both with consumers and other parties to the process to enable improved behaviors (quality, ease of use) as well as alternative communication mechanisms to respond to personal profiles. The airline boarding pass App has been a pathfinder, and many business processes will follow the example.

Beyond the "horses mouth" we expect most interfaces in a business process will be service interfaces with ecosystem partners. Most end user interfaces will be mobile .using heterogeneous, consumer devices. Regardless of whether the user is an employee, partner employee, agent or end consumer, there will be a multiplicity of devices that will be in the overwhelming majority of situations, the end users. personal property, and not under the control of any enterprise.

Finally we note the recent acquisition by Apple of Siri, a small start-up that created a voice activated personal assistant application. A Siri user can simply say, "Tell my wife I.ll be 20 minutes late," and Siri scours the user.s social networks, address books and other programs, finds the person tagged "wife" converts the message to text, and sends it directly to her phone. We expect voice recognition combined with smart Apps to considerably strengthen the convergence of consumer and business technologies and stimulate a whole raft of innovative UI patterns.

Patterns
The core pattern underlying the Service Oriented Enterprise (SOE) is illustrated in Figure 1: the Differentiated Response. An SOE is part of an ecosystem in which capabilities (potentially from many collaborating businesses) subscribe to events which are of common interest.

Figure 1: Differentiated Response Pattern

However in the SOE subscribing capabilities may have very different perspectives on the common event. For example:

  • A sensor at a toll barrier records a car license plate passing the barrier. The toll operator capability will typically make the immediate response of posting a charge to an account. But in parallel the police may also subscribe to the service and track movements of license plates of interest. Also in parallel a market research company may subscribe to the data for market analysis.

The differentiated response pattern encourages us to look for collaborations across unconventional partners that would not typically be part of a unified business process.

Conclusion and Remarks
In the CBDI SOA Maturity Model first published in 2004 we identified the Ecosystem maturity stage as "following" the Enterprise stage. For many years few were interested in what lay beyond the enterprise, for most organizations it was out of sight. However we always predicted that last stage implied big changes and today we see the SOE will have profound impacts on organizations. For example:

  • A reduction in enterprise scope to focus on core capabilities
  • Capability ownership drives organizational structure
  • Autonomics and direct connection with leaf nodes in the business process will lead to reduction in workforce.
  • Empowerment of the customer as the real ¡°end user¡±.
  • The demise of intermediaries
  • The demise of the call center as routine transactions and queries handled by smart autonomic systems; the rise of advisors . specialists who have skills and authority to sort out real exceptions

There are examples of the SOE in some successful corporations today. But you have to assess that they arrived at the strategy by a combination of lucky accident and individual genius. So what do architects and business managers do to make sure they have a strategy and are moving down the right path? Here are some recommended actions:

  1. Understand your capabilities, classify them as core and context and act accordingly
  2. Figure out your place in one or more ecosystems? Look at it from your customers., partners and suppliers perspective. Analyze the capability intersection
  3. Organize around core capabilities, encapsulate business processes, MI and BI inside the capabilities.
  4. Partner for context capabilities

Finally there is a table of relevant patterns appended to this article. Some of these are new and we will document these further.

References

More Stories By David Sprott

David Sprott is a consultant, researcher and educator specializing in service oriented architecture, application modernization and cloud computing. Since 1997 David founded and led the well known think tank CBDI Forum providing unique research and guidance around loose coupled architecture, technologies and practices to F5000 companies and governments worldwide. As CEO of Everware-CBDI International a UK based corporation, he directs the global research and international consulting operations of the leading independent advisors on Service Oriented Application Modernization.

@MicroservicesExpo Stories
"We've just seen a huge influx of new partners coming into our ecosystem, and partners building unique offerings on top of our API set," explained Seth Bostock, Chief Executive Officer at IndependenceIT, in this SYS-CON.tv interview at 16th Cloud Expo, held June 9-11, 2015, at the Javits Center in New York City.
SYS-CON Events announced today that HPM Networks will exhibit at the 17th International Cloud Expo®, which will take place on November 3–5, 2015, at the Santa Clara Convention Center in Santa Clara, CA. For 20 years, HPM Networks has been integrating technology solutions that solve complex business challenges. HPM Networks has designed solutions for both SMB and enterprise customers throughout the San Francisco Bay Area.
Container technology is sending shock waves through the world of cloud computing. Heralded as the 'next big thing,' containers provide software owners a consistent way to package their software and dependencies while infrastructure operators benefit from a standard way to deploy and run them. Containers present new challenges for tracking usage due to their dynamic nature. They can also be deployed to bare metal, virtual machines and various cloud platforms. How do software owners track the usag...
One of the ways to increase scalability of services – and applications – is to go “stateless.” The reasons for this are many, but in general by eliminating the mapping between a single client and a single app or service instance you eliminate the need for resources to manage state in the app (overhead) and improve the distributability (I can make up words if I want) of requests across a pool of instances. The latter occurs because sessions don’t need to hang out and consume resources that could ...
The Software Defined Data Center (SDDC), which enables organizations to seamlessly run in a hybrid cloud model (public + private cloud), is here to stay. IDC estimates that the software-defined networking market will be valued at $3.7 billion by 2016. Security is a key component and benefit of the SDDC, and offers an opportunity to build security 'from the ground up' and weave it into the environment from day one. In his session at 16th Cloud Expo, Reuven Harrison, CTO and Co-Founder of Tufin,...
Alibaba, the world’s largest ecommerce provider, has pumped over a $1 billion into its subsidiary, Aliya, a cloud services provider. This is perhaps one of the biggest moments in the global Cloud Wars that signals the entry of China into the main arena. Here is why this matters. The cloud industry worldwide is being propelled into fast growth by tremendous demand for cloud computing services. Cloud, which is highly scalable and offers low investment and high computational capabilities to end us...
You often hear the two titles of "DevOps" and "Immutable Infrastructure" used independently. In his session at DevOps Summit, John Willis, Technical Evangelist for Docker, covered the union between the two topics and why this is important. He provided an overview of Immutable Infrastructure then showed how an Immutable Continuous Delivery pipeline can be applied as a best practice for "DevOps." He ended the session with some interesting case study examples.
Digital Transformation is the ultimate goal of cloud computing and related initiatives. The phrase is certainly not a precise one, and as subject to hand-waving and distortion as any high-falutin' terminology in the world of information technology. Yet it is an excellent choice of words to describe what enterprise IT—and by extension, organizations in general—should be working to achieve. Digital Transformation means: handling all the data types being found and created in the organizat...
JavaScript is primarily a client-based dynamic scripting language most commonly used within web browsers as client-side scripts to interact with the user, browser, and communicate asynchronously to servers. If you have been part of any web-based development, odds are you have worked with JavaScript in one form or another. In this article, I'll focus on the aspects of JavaScript that are relevant within the Node.js environment.
Approved this February by the Internet Engineering Task Force (IETF), HTTP/2 is the first major update to HTTP since 1999, when HTTP/1.1 was standardized. Designed with performance in mind, one of the biggest goals of HTTP/2 implementation is to decrease latency while maintaining a high-level compatibility with HTTP/1.1. Though not all testing activities will be impacted by the new protocol, it's important for testers to be aware of any changes moving forward.
This week, I joined SOASTA as Senior Vice President of Performance Analytics. Given my background in cloud computing and distributed systems operations — you may have read my blogs on CNET or GigaOm — this may surprise you, but I want to explain why this is the perfect time to take on this opportunity with this team. In fact, that’s probably the best way to break this down. To explain why I’d leave the world of infrastructure and code for the world of data and analytics, let’s explore the timing...
Learn how to solve the problem of keeping files in sync between multiple Docker containers. In his session at 16th Cloud Expo, Aaron Brongersma, Senior Infrastructure Engineer at Modulus, discussed using rsync, GlusterFS, EBS and Bit Torrent Sync. He broke down the tools that are needed to help create a seamless user experience. In the end, can we have an environment where we can easily move Docker containers, servers, and volumes without impacting our applications? He shared his results so yo...
Auto-scaling environments, micro-service architectures and globally-distributed teams are just three common examples of why organizations today need automation and interoperability more than ever. But is interoperability something we simply start doing, or does it require a reexamination of our processes? And can we really improve our processes without first making interoperability a requirement for how we choose our tools?
Cloud Migration Management (CMM) refers to the best practices for planning and managing migration of IT systems from a legacy platform to a Cloud Provider through a combination professional services consulting and software tools. A Cloud migration project can be a relatively simple exercise, where applications are migrated ‘as is’, to gain benefits such as elastic capacity and utility pricing, but without making any changes to the application architecture, software development methods or busine...
The Internet of Things. Cloud. Big Data. Real-Time Analytics. To those who do not quite understand what these phrases mean (and let’s be honest, that’s likely to be a large portion of the world), words like “IoT” and “Big Data” are just buzzwords. The truth is, the Internet of Things encompasses much more than jargon and predictions of connected devices. According to Parker Trewin, Senior Director of Content and Communications of Aria Systems, “IoT is big news because it ups the ante: Reach out ...
At DevOps Summit NY there’s been a whole lot of talk about not just DevOps, but containers, IoT, and microservices. Sessions focused not just on the cultural shift needed to grow at scale with a DevOps approach, but also made sure to include the network ”plumbing” needed to ensure success as applications decompose into the microservice architectures enabling rapid growth and support for the Internet of (Every)Things.
Our guest on the podcast this week is Adrian Cockcroft, Technology Fellow at Battery Ventures. We discuss what makes Docker and Netflix highly successful, especially through their use of well-designed IT architecture and DevOps.
Explosive growth in connected devices. Enormous amounts of data for collection and analysis. Critical use of data for split-second decision making and actionable information. All three are factors in making the Internet of Things a reality. Yet, any one factor would have an IT organization pondering its infrastructure strategy. How should your organization enhance its IT framework to enable an Internet of Things implementation? In his session at @ThingsExpo, James Kirkland, Red Hat's Chief Arch...
Public Cloud IaaS started its life in the developer and startup communities and has grown rapidly to a $20B+ industry, but it still pales in comparison to how much is spent worldwide on IT: $3.6 trillion. In fact, there are 8.6 million data centers worldwide, the reality is many small and medium sized business have server closets and colocation footprints filled with servers and storage gear. While on-premise environment virtualization may have peaked at 75%, the Public Cloud has lagged in adop...
MuleSoft has announced the findings of its 2015 Connectivity Benchmark Report on the adoption and business impact of APIs. The findings suggest traditional businesses are quickly evolving into "composable enterprises" built out of hundreds of connected software services, applications and devices. Most are embracing the Internet of Things (IoT) and microservices technologies like Docker. A majority are integrating wearables, like smart watches, and more than half plan to generate revenue with ...